Sunday, December 28, 2008

Numerical Methods for Scientists and Engineers or All in One Security Certification Exam Guide

Numerical Methods for Scientists and Engineers

Author: Richard W Hamming

For this inexpensive paperback edition of a groundbreaking classic, the author has extensively rearranged, rewritten and enlarged the material. Book is unique in its emphasis on the frequency approach and its use in the solution of problems. Contents include: Fundamentals and Algorithms; Polynomial Approximation — Classical Theory; Fourier Approximation — Modern Therory; Exponential Approximation.



Go to: Confederate Industry or Business Partnering for Continuous Improvement

All-in-One Security+ Certification Exam Guide

Author: Gregory B Whit

All-in-One is all you need! This authoritative reference offers complete coverage of all material on the Security+ certification exam. You’ll find exam objectives at the beginning of each chapter, helpful exam tips, end-of-chapter practice questions, and photographs and illustrations. The bonus CD-ROM contains a testing engine with questions found only on the CD. This comprehensive guide not only helps you pass this challenging exam, but will also serve as an invaluable on-the-job reference.



Table of Contents:
Acknowledgments
Preface
Introduction
Pt. IAuthentication1
Ch. 1General Security Concepts3
Pt. IIMalware and Attacks27
Ch. 2Types of Attacks and Malicious Software29
Pt. IIISecurity in Transmissions59
Ch. 3Remote Access61
Ch. 4E-Mail89
Ch. 5Web Components103
Ch. 6Wireless and Instant Messaging133
Pt. IVSecurity for the Infrastructure153
Ch. 7Infrastructure Security155
Ch. 8Intrusion Detection Systems195
Ch. 9Security Baselines223
Pt. VCryptography and Applications277
Ch. 10Cryptography279
Ch. 11Public Key Infrastructure307
Ch. 12Standards and Protocols357
Pt. VIOperational Security383
Ch. 13Operational/Organizational Security385
Ch. 14Disaster Recovery, Business Continuity, and Organizational Policies405
Pt. VIIAdministrative Controls431
Ch. 15Security and Law433
Ch. 16Privilege Management447
Ch. 17Computer Forensics463
Ch. 18Risk Management477
Ch. 19Change Management495
Pt. VIIIAppendixes509
App. A: About the CD-ROM511
App. BOSI Model and Internet Protocols513
Glossary523
Index537

No comments:

Post a Comment